Page 320 - The Secret War in the Italian front in WWI (1915-1918)
P. 320

THE SECRET WAR ON THE ITALIAN FRONT IN WWI (1915 – 1918)




              The instructions of the T1 show it adopted double transposition methods with a 9-letter key changed
              daily according to tables distributed to radiotelegraphic stations every month . The drafter of the
                                                                                    10
              instructions, probably Sacco himself, recommended to implement double transposition, because
              “the single one would make decoding easier to the enemy and therefore had to be strictly forbidden”
              (picture.14.2) .
                           11
              Similar ciphers were already widely used, especially throughout the German army from the first
              months of the war. For instance, the French analysts managed to decrypt dispatches coded by
              the German ÜBCHI cipher, mainly because their enemies left the keys unchanged for several
              days, increasing the probability of detecting telegrams of equal length within a large amount of
              cryptographic material: indeed, a prerequisite to apply a decoding process known as ‘multiple
              anagrams technique’ which was already known at the end of the 19  century .
                                                                            th
                                                                                    12
              Conversely, a long enough key replaced daily posed serious obstacles to the double transposition
              forcing, especially if encoding was producing ‘incomplete rectangles’ and provided, of course,
              that the operators avoided carelessness and errors in encoding . Combined with the scarcity
                                                                          13
              of cryptographic material, this explains why the Austrian crypto analysts never mention the T1
              chipher.
              The ciphering system was sound enough to remain valid after the war, at least through 1919. The
              T2 version introduced in April of that year, used keys with variable length between 8 to 10 letters,
              instead of exactly 9, replaced any other day .
                                                      14


              14.2   OTHER RELEVANT PRODUCTS OF THE CRYPTOGRAPHIC UNIT


              The InTer-allIed code (I.a.)

              By November 1917, six French and five British divisions had arrived in Italy and reached the front
              lines by the end of December 1917. In the spring of the following year, part of these troops returned
              to the western front while three French and two British divisions remained in Italy to fight.
              Their telecommunications systems had to be linked with those of the Italian army to ensure rapid
              and effective communication between Staffs and then among the units deployed to adjacent sectors
              on the front. As of wireless communications, compatibility of frequencies and a suitable three-
              language code, known as I.A. code, had to be arranged.
              Section R’s logs of 8 December 1917, reported that, on the previous day, Major Sacco had reached
              the Headquarters of the Supreme Command in Padua “to settle the issue of drafting and using
              ciphers for correspondence with the French and British allies” . During the four-day mission, the
                                                                       15
              foundations were laid to adopt the inter-allied code and the Italian Cryptographic Unit was tasked



              10  Library of the ISCAG, coll. XXXI A, n° 11129. The key was a 9-letter word transformed into a numeric key through the
              method explained in the previous chapters.
              11  ibidem.
              12  F. L. Bauer, op. cit. p.95 - 98; 421 - 423. This method can be applied to all transposition systems. It consists of superimposing
              two or more messages of equal length and then putting together pairs of columns with the purpose of finding the one with the
              most likely bi-grams in the language of the messages. The chosen columns are then put together with the remaining columns
              to find the group with the most likely tri-grams. One should be able to start seeing fragments of the messages in plain text, to
              which the remaining columns of the cryptograms are approached one after another to find the messages’ content.
              13  The examples in the T1 Instruction Handbook portrayed only incomplete rectangles, that is, the last row had variable length
              based on the number of letters contained in the messages, as it happens with a fixed columns number.
              14  The double transposition with frequently variable key found large application during the WWII too.
              15  Section R logs, 7 December 1917, AUSSME, Series B1, 101S, Vol. 307d.


                318
   315   316   317   318   319   320   321   322   323   324   325